Welcome!

Machine Learning Authors: Yeshim Deniz, Zakia Bouachraoui, Liz McMillan, Pat Romanski, Elizabeth White

Related Topics: Adobe Flex, ColdFusion, Machine Learning

Adobe Flex: Article

Flex User Groups and Conflict of Interest

What the leaders of Flex User Groups are afraid of?

First of all, to add a little more credibility to what I’m about to write, let me just say that I’m running Princeton Java Users Group (JUG) for years and have a pretty good idea of how organization of the meetings and sponsorship work in such gatherings.

Java community is huge, well established and has a loyal following of leaders and enthusiasts that are willing to spend some of their evenings meeting with their peers and attending presentations by either well known or by no so famous yet presenters.

As a leader of this JUG I often receive emails asking to promote among our members a commercial training event. I do it on one condition: our JUG members have to get some additional benefits from such a vendor, for example, discounted price, free speakers coming over to our JUG, free software licenses…something.

During the last several years, I spent a substantial portion of my time working with Adobe Flex and often fly with my colleagues around the world running either commercial training sessions on behalf of our company or just speaking at the user groups or technical conferences.

While promoting our events I started approaching the leaders of the local Flex/Flash user groups asking them to spread the word about our training session and/or offering to present at their user groups while I’m in town.

To my surprise, pretty often they either just ignore such offers or give a polite response with some lame excuse for not doing this.  Things started to clear up when at one city I was allowed to talk, but was asked not to promote our Flex training because the company that provided the room and pizza was running their own training classes in Flex and were afraid of competition. No problem. Sounds fair.

One of the Flex user group leaders never responds to such offers. Ever. And I tried it multiple times.

In one city, I didn’t get any response to my first email, sent another one and the leaders of that group got back to me – thank you for the offer to speak at our UG, but we are not running any sessions during summer. Fine. You didn’t want me to deliver a technical presentation for free, but why not spreading the word about our technical training and offer a discount to their membership? When we were running the training class in that city, one of the attendees explained me the reason – the local Flex UG is being run by a consulting company that offers Flex services and doesn’t want to allow any competition in the Flex space.

The recent response from yet another UG was very upbeat: thanks for this great offer, we’ll post the information about your event on our Web site. Needless to say that it never happened…

The Web sites of some of the Flex/Flash users groups don't even provide contact information and the comments to their posts are closed.

It seems to be a trend. This leaves a bitter taste in my mouth given the fact that I often get emails from Flex developers from around the country asking if our company is planning to run a training event in their town. Our events are pure technical, we are happy to share with you pretty advanced tricks and techniques learned while developing our open source projects of during work on real-world projects. We don’t sell anything during these events, and typically, the tuition just barely covers our expenses. Guys, we don’t mind flying to your city, but please talk to your Flex/Flash UG leaders to open their doors.

We’ll keep running our advanced Flex training events anyway. Let’s see if the local Flex User Groups will cooperate in spreading the word about our upcoming training sessions in London (enter the code FLUG at the registration page to get £150 off the tuition) and Atlanta.

More Stories By Yakov Fain

Yakov Fain is a Java Champion and a co-founder of the IT consultancy Farata Systems and the product company SuranceBay. He wrote a thousand blogs (http://yakovfain.com) and several books about software development. Yakov authored and co-authored such books as "Angular 2 Development with TypeScript", "Java 24-Hour Trainer", and "Enterprise Web Development". His Twitter tag is @yfain

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomplished expert in Enterprise Architecture, Adi has also served as CxO advisor to numerous Fortune executives.
In addition to 22 Keynotes and General Sessions, attend all FinTechEXPO Blockchain "education sessions" plus 40 in two tracks: (1) Enterprise Cloud (2) Digital Transformation. PRICE EXPIRES AUGUST 31, 2018. Ticket prices: ($295-Aug 31) ($395-Oct 31) ($495-Nov 12) ($995-Walk-in) Does NOT include lunch.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and government officials, including Michelle Obama, former CIA director John Brennan, Kim Kardashian and Tiger Woods. Taylor recently became an advisor to cybersecurity start-up Path which helps companies make sure their websites are properly loading around the globe.
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, insiders, government compulsion, and network hackers? Join Ambuj Kumar (CEO, Fortanix) to discuss best practices and technologies for enterprises to securely transition to a multi-cloud hybrid world.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Economics degree with a minor in Computer Science from St. Andrews Presbyterian University (Laurinburg, North Carolina). She resides in metro-Atlanta (Georgia).